Answer Posted / talat
are you refering to objects by any chance..
if so the following are used
S_User_auth
S-user_pro
s_user_grp
hope that helps
| Is This Answer Correct ? | 1 Yes | 2 No |
Post New Answer View All Answers
Explain document transfer-level security?
What is the difference between authorization object and authorization object class?
What is a composite role?
What is audit information system?
What is stad?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this
What does the account assessment category specify in a purchasing document in SAP Materials Management?
Can you explain protecting public keys?
Differentiate between usobx_c and usobt_c
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
what is the critical issue u are faced in your previous experience
How to insert missing authorization?
how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
What authorization are required to create and maintain user master records?
what things you have to take care before executing run system trace?